Block data leaks at the endpoint
TrendMicro, Websense offer effective protection against insider security breaches
However, the application-centricity requires the administrator to maintain vigilance of the applications installed on his network, and keep the endpoint profiles up to date. It also means the administrator can't apply policies that restrict a user from moving the files around in Windows. It also suffered from small glitches in the configuration interface and user experience. With a bit of polish on the interface and some improvements to the blocking accuracy, this would be a stellar product.
Identity Finder seems best suited to smaller organizations where the responsibility of data protection can be delegated to the user base. Enterprise-level configuration is not quite on par with Data Endpoint and LeakProof, and the lack of a blocking function precludes it from the circle of big time DLP vendors. On the other hand, the remediation abilities it gives to users are impressive, the endpoint interface is friendly and easy to understand, and it is very good at its intended purpose -- finding identity-related data. Identity Finder was also the only product that supported Mac OS.
Blakely is pursuing his Doctorate of Philosophy in Computer Engineering at the Iowa State University of Science and Technology. He works as a research assistant at the Iowa State University Internet-Scale Event and Attack Generation Environment Laboratory (ISEAGE). He can be reached at firstname.lastname@example.org.
Rabe is a graduate student at the Iowa State University of Science and Technology. He is pursuing his Master's of Science in Computer Engineering and Information Assurance. Justin Duffy is a senior undergraduate student at the Iowa State University of Science and Technology.